General

  • Target

    926ad2d71e44aa415059e611b53f77.apk

  • Size

    21.2MB

  • Sample

    220705-bq7fdscfhn

  • MD5

    95926ad2d71e44aa415059e611b53f77

  • SHA1

    ed76e854a87f4380e6af68d5e7a3a38fc9b2545f

  • SHA256

    98dd273114004514b32dd570e9011b6d6437e36f8ac6294ed38e4287037ddbbe

  • SHA512

    e231659b4287a0bf9298e17e9bb07ca132697c97ca212af0bb9bcaf516ceb3a863f0acb78ae90361cd70794d7238d260a77eb93ff2382d267afa78037e57f755

Malware Config

Targets

    • Target

      926ad2d71e44aa415059e611b53f77.apk

    • Size

      21.2MB

    • MD5

      95926ad2d71e44aa415059e611b53f77

    • SHA1

      ed76e854a87f4380e6af68d5e7a3a38fc9b2545f

    • SHA256

      98dd273114004514b32dd570e9011b6d6437e36f8ac6294ed38e4287037ddbbe

    • SHA512

      e231659b4287a0bf9298e17e9bb07ca132697c97ca212af0bb9bcaf516ceb3a863f0acb78ae90361cd70794d7238d260a77eb93ff2382d267afa78037e57f755

    • Detected phishing page

    • Checks Android system properties for emulator presence.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks